Distributed Localization Algorithm Using Hybrid Cuckoo Search with Hill Climbing (CS-HC) Algorithm for Internet of Things
DOI:
https://doi.org/10.61841/sy9qe459Keywords:
Distributed Localization, Computational Complexity, Hybrid Cuckoo Search, Hill Climbing, Internet of Things.Abstract
Currently, Internet of Things (IoT) influenced applications are significant upon deployed sensors accurately. Anyhow, classical optimization problem is induced along NP-hard class of problems to determine the accurate localization of deployed sensors nodes. Thence this proposal work provides distributed localization algorithm using hybrid Cuckoo search with hill climbing (CS-HC) algorithm. In turn it improvises the mechanism of optimisation solution by validating threshold value for IoT. Computational complexity get reduced by locating deployed sensor nodes via CS-HC algorithm as well as increase lifetime of resource constrained IoT sensor nodes. Simulated results predicts that proposed CS-HC algorithm produces significant performance accurately
Downloads
References
[1] C.-W. Tsai, C.-F. Lai, and A. V. Vasilakos, “Future internet of things: open issues and challenges,” Wireless
Networks, vol. 20, no. 8, pp. 2201– 2217, 2014.
[2] S. Hasan and E. Curry, “Thingsonomy: Tackling variety in internet of things events,” IEEE Internet Computing, vol.
19, no. 2, pp. 10–18, 2015.
[3] X. Li, R. Lu, X. Liang, X. Shen, J. Chen, and X. Lin, “Smart community: an internet of things application.” IEEE
Communications Magazine, vol. 49, no. 11, pp. 68–75, 2011.
[4] Z. Chen, F. Xia, T. Huang, F. Bu, and H. Wang, “A localization method for the internet of things,” The Journal of
Supercomputing, vol. 63, no. 3, pp. 657–674, 2013.
[5] S. Cirani, L. Davoli, G. Ferrari, R. Leone, P. Medagliani, M. Picone, ´ and L. Veltri, “A scalable and self-configuring
architecture for service discovery in the internet of things,” IEEE Internet of Things Journal, vol. 1, no. 5, pp. 508–
521, 2014.
[6] S. Raza, L. Wallgren, and T. Voigt, “Svelte: Real-time intrusion detection in the internet of things,” Ad hoc networks,
vol. 11, no. 8, pp. 2661– 2674, 2013.
[7] L. Zhou and H.-C. Chao, “Multimedia traffic security architecture for the internet of things,” IEEE Network, vol. 25,
no. 3, pp. 35–40, 2011.
[8] S. Sivakumar and R. Venkatesan, “Meta-heuristic approaches for minimizing error in localization of wireless sensor
networks,” Applied Soft Computing, vol. 36, pp. 506–518, 2015.
[9] J. Hightower and G. Borriello, “A survey and taxonomy of location systems for ubiquitous computing,” IEEE
computer, vol. 34, no. 8, pp. 57–66, 2001.
[10] N. Bulusu, J. Heidemann, and D. Estrin, “Gps-less low-cost outdoor localization for very small devices,” IEEE
personal communications, vol. 7, no. 5, pp. 28–34, 2000.
[11] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research
challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012.
[12] S. Pandey and S. Varma, “A range based localization system in multihop wireless sensor networks: A distributed
cooperative approach,” Wireless Personal Communications, vol. 86, no. 2, pp. 615–634, 2016.
[13] M. Aziz, M.-H. Tayarani-N, and M. R. Meybodi, “A two-objective memetic approach for the node localization
problem in wireless sensor networks,” Genetic Programming and Evolvable Machines, vol. 17, no. 4, pp. 321–358,
2016.
[14] M. X. Cheng and W. B. Wu, “A model-free localization method for sensor networks with sparse anchors,” in
Communications (ICC), 2016 IEEE International Conference on. IEEE, 2016, pp. 1–7.
[15] A. Pal, “Localization algorithms in wireless sensor networks: Current approaches and future challenges,” Network
protocols and algorithms, vol. 2, no. 1, pp. 45–73, 2010.
[16] G. Mao, B. Fidan, and B. D. Anderson, “Wireless sensor network localization techniques,” Computer networks, vol.
51, no. 10, pp. 2529– 2553, 2007.
[17] A. Gopakumar and L. Jacob, “Localization in wireless sensor networks using particle swarm optimization,” in
Wireless, Mobile and Multimedia Networks, 2008. IET International Conference on. IET, 2008, pp. 227– 230.
[18] R. V. Kulkarni and G. K. Venayagamoorthy, “Particle swarm optimization in wireless-sensor networks: A brief
survey,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 41, no. 2, pp.
262–267, 2011.
[19] Nandagopal S., Arunachalam V.P., Karthik S."A novel approach for inter-transaction association rule mining, Journal
of Applied Sciences Research VOL, 8, Issue 7, 2012.
[20] Kannan R., Selvambikai M., Jeena Rajathy I., Ananthi S. Rasayan, A study on structural analysis of electroplated
Nano crystalline nickel based thin films, Journal of Chemistry, Vol 10, issue 4, 2017.
[21] Arunvivek G.K., Maheswaran G., Senthil Kumar S., Senthilkumar M., Bragadeeswaran T. Experimental study on
influence of recycled fresh concrete waste coarse aggregate on properties of concrete. International Journal of
Applied Engineering Research, Vol 10, issue 11, 2015
[22] Krishna S.K., Sathya M. Usage of nanoparticle as adsorbent in adsorption process. A review International Journal of
Applied Chemistry, vol 11, Issue 2, 2015.
[23] Sudha S., Manimegalai B., Thirumoorthy P. A study on routing approach for in-network aggregation in wireless
sensor networks, International Conference on Computer Communication and Informatics: Ushering in Technologies
of Tomorrow, Today, ICCCI 2014.
[24] Satheesh A., Jeyageetha V. Improving power system stability with facts controller using certain intelligent
techniques, International Journal of Applied Engineering Research, Vol 9, no 23, 2014.
[25] Ashok V., Kumar N, Determination of blood glucose concentration by using wavelet transform and neural networks,
Iranian Journal of Medical Sciences, Vol 38, Issue 1, 2013.
[26] Somasundaram K., Saritha S., Ramesh K, Enhancement of network lifetime by improving the leach protocol for large
scale WSN, Indian Journal of Science and Technology, Vol 9, Issue 16, 2016.
[27] Jayavel S., Arumugam S., Singh B., Pandey P., Giri A., Sharma A. Use of Artificial Intelligence in automation of
sequential steps of software development / production, Journal of Theoretical and Applied Information Technology,
Vol 57, Issue 3, 2013.
[28] Ramesh Kumar K.A., Balamurugan K., Gnanaraj D., Ilangovan S, Investigations on the effect of flyash on the SiC
reinforced aluminium metal matrix composites, Advanced Composites Letters, Vol 23, Issue 3, 2014.
[29] Suresh V.M., Karthikeswaran D., Sudha V.M., Murali Chandraseker D, Web server load balancing using SSL backend forwarding method. IEEE-International Conference on Advances in Engineering, Science and Management,
ICAESM-2012, 2012.
[30] Karthikeswaran D., Sudha V.M., Suresh V.M., Javed Sultan A, A pattern based framework for privacy preservation
through association rule mining, IEEE-International Conference on Advances in Engineering, Science and
Management, ICAESM-2012, 2012.
[31] Senthil J., Arumugam S., Shah P, Real time automatic code generation using generative programming paradigm,
European Journal of Scientific Research, vol. 78, issue 4, 2012.
[32] Vijayakumar J., Arumugam S, Certain investigations on foot rot disease for betelvine plants using digital imaging
technique, Proceedings - 2013 International Conference on Emerging Trends in Communication, Control, Signal
Processing and Computing Applications, IEEE-C2SPCA", 2013.
[33] Vijayakumar J., Arumugam S. Odium piperis fungus identification for piper betel plants using digital image
processing, Journal of Theoretical and Applied Information Technology, vol 60, issue 2, 2014.
[34] Manchula A., Arumugam S, Face and fingerprint biometric fusion: Multimodal feature template matching algorithm,
International Journal of Applied Engineering Research, vol 9, issue 22, 2014.
[35] Ramesh Kumar K.A., Balamurugan K., Arungalai Vendan S., Bensam Raj J, Investigations on thermal properties,
stress and deformation of Al/SiC metal matrix composite based on finite element method. Carbon - Science and
Technology, Vol 6, Issue 3, 2014.
[36] Kanchana A., Arumugam S, Palm print texture recognition using connected-section morphological segmentation,
Asian Journal of Information Technology Vol 6, Issue 3, 2014.
[37] Padmapriya R., Thangavelu P, Characterization of nearly open sets using fuzzy sets, Global Journal of Pure and
Applied Mathematics, vol 11, issue 1, 2015.
[38] P.B. Narandiran, T. Bragadeeswaran, M. Kamalakannan, V. Aravind, Manufacture of Flyash Brick Using Steel Slag
and Tapioca Powder. Jour of Adv Research in Dynamical & Control Systems, Vol. 10, No. 12, 2018, 527-532
[39] R. Girimurugan*, N. Senniangiri, K. Adithya, B. Velliyangiri, Mechanical Behaviour of Coconut Shell Powder
Granule Reinforced Epoxy Resin Matrix Bio Composites, Jour of Adv Research in Dynamical & Control Systems,
Vol. 10, No. 12, 2018, 533-541.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.